One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 481025
Date de publication 2018-02-12 14:00:00 (vue: 2018-02-12 14:00:00)
Titre Global Cybersecurity Concerns in 2018
Texte People around the world are becoming increasingly connected with smart devices. Sending and receiving massive amounts of data back and forth, we rely on the transfer and storage of data on a daily basis. Hackers and cyber attackers know this and know how steal data for their profit. Your job as an information security specialist is to defend your company’s data, implementing preventative and protective measures and monitoring your data and systems. With the increasing amount of data businesses and its customers are producing comes an increasing number of people maliciously trying to obtain it. In 2017, we saw increases in ransomware attacks, financial fraud and massive data breaches. It was a busy year for security practitioners, and 2018 will be no different, with new global regulations, redesigned threats to new devices, and ways to combat those threats.    Let’s take look at some cybersecurity issues every InfoSec specialist should be aware of in the coming months of 2018. Upcoming Requirements of the GDPR The General Data Protection Regulation is the European Union’s way of protecting its citizens’ data by holding organizations and companies accountable in practices of security personnel in regards to sensitive information. As of May 25, 2018, companies will risk severe fines if they are not in compliance with the GDPR data protection rules. In an effort to minimize the damage done during recent data breaches, rules will be implemented on how you and your company obtain and secure data, as well as notifying users of the breach immediately. Under the GDPR, companies will rely on their IT security specialists to: Be given explicit consent when obtaining customer data. Be clear and upfront with customers in how they’ll obtain this data in language that is accessible and easy to understand. Comply with data protection officers who will inventory data in the EU, including outside company data that pertains to goods and services held within the EU. In the event of a breach, notify the public within 72 hours or be penalized. The EU isn’t the only geography implementing privacy measures for its citizens. Australia implemented privacy regulations recently as well.  The Liabilities of IoT In a day and age where humans are increasingly integrating the internet into their day-to-day lives, we have no choice but to submerge ourselves in the internet of things (IoT). This includes the business world as well. Mobile devices have become a necessity and a network of connected smartphones, tablets and other smart devices has made it considerably easier for businesses to access information from the internet and communicate. It also has made it considerably easier for hackers to get their hands on the same information — which is, in turn, making it harder and harder on the InfoSec practitioner. For usability purposes, nearly everything can be connected to Wi-Fi. A company’s smart coffee pot can be connected to an iPhone for a convenient cu
Envoyé Oui
Condensat 2017 2018 above access accessible accountable actual adds after age algorithm also amount amounts annoying another apps are around asymmetric attackers attacks australia aware back basis become becoming being below best breach breaches build building business businesses busy but can capable case choice citizens citizens’ clear climbing code coffee combat come comes coming communicate companies company company’s competitive compliance comply concept concern concerns conclusion connected consent considerably consumer convenient corner credit: cryptocurrency cryptography cup customer customers cyber cybersecurity daily damage data day decode decoded decrypt decrypted decryption defend defenses describes despite determined devices different difficult direct discrimination done double during easier easy edge effort encrypt encrypted encryption encrypts enough error especially european event every everything explicit exploiting fastest financial fines flaws flooded focusing forth fraud from full gdpr general geography get gets getting given global globe goods graph graphic: growing hackers hand hands harder has hastily have held holding hours how however humans illegally immediately implement implemented implementing impossible includes including incomprehensible increases increasing increasingly industries information infosec integrating intended internet inventory iot iphone isn’t issues it’s its job joe just keep key keys know kroll language layer leaving let’s liabilities lives look made mainly maintain make making maliciously manufactured massive may meant measures minimize mobile monitoring months more most nearly necessity need network networks new normally not notify notifying number obtain obtaining officers often one only ontrack opposed oracle organizations original other ourselves outside pair penalized people perhaps person personnel pertains photo pot practice practices practitioner practitioners preventative privacy private process produces producing profit pronged proper protecting protection protective public purposes ransomware rate receiving recent recently redesigned referring refers regards regulation regulations rely render requirements requires risk rules safe safety same saw scrambled scrambling secure securing security see sending sensitive services severe should simple sit small smart smartphones some something specialist specialists standard steadily steal storage stored strong submerge susceptibilities symmetric systems tablets tabs take than then these they’ll things those threats to: toaster toasters track tracking transfer transferred transmitted trend tries trying turn tv’s two under understand understood union’s unscrambling upcoming upfront usability use used useless user users users: versed virtually visible vulnerability wait way ways well when where which who whole why will within without works world worse year your
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: